Chamseddine Talhi
Chamseddine Talhi
Verified email at
Cited by
Cited by
A survey on federated learning: The journey from centralized to distributed on-site learning and beyond
S AbdulRahman, H Tout, H Ould-Slimane, A Mourad, C Talhi, M Guizani
IEEE Internet of Things Journal 8 (7), 5476-5497, 2020
Internet of things intrusion detection: Centralized, on-device, or federated learning?
SA Rahman, H Tout, C Talhi, A Mourad
IEEE Network 34 (6), 310-317, 2020
Multi-tenant isolation in a cloud environment using software defined networking
M Pourzandi, MF Ahmed, M Cheriet, C Talhi
US Patent 9,912,582, 2018
FedMCCS: Multicriteria client selection model for optimal IoT federated learning
S AbdulRahman, H Tout, A Mourad, C Talhi
IEEE Internet of Things Journal 8 (6), 4723-4735, 2020
An anomaly detection system based on variable N-gram features and one-class SVM
W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi
Information and Software Technology 91, 186-197, 2017
Formal verification and validation of UML 2.0 sequence diagrams using source and destination of messages
V Lima, C Talhi, D Mouheb, M Debbabi, L Wang, M Pourzandi
Electronic notes in theoretical computer science 254, 143-160, 2009
A novel ad-hoc mobile edge cloud offering security services through intelligent resource-aware offloading
T Dbouk, A Mourad, H Otrok, H Tout, C Talhi
IEEE Transactions on Network and Service Management 16 (4), 1665-1680, 2019
Extraction of forensically sensitive information from windows physical memory
SM Hejazi, C Talhi, M Debbabi
digital investigation 6, S121-S131, 2009
Smartphone malware detection: From a survey towards taxonomy
A Amamra, C Talhi, JM Robert
2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012
Execution monitoring enforcement under memory-limitation constraints
C Talhi, N Tawbi, M Debbabi
Information and Computation 206 (2-4), 158-184, 2008
A theoretical model for block propagation analysis in bitcoin network
Y Shahsavari, K Zhang, C Talhi
IEEE Transactions on Engineering Management 69 (4), 1459-1476, 2020
A theoretical model for fork analysis in the bitcoin network
Y Shahsavari, K Zhang, C Talhi
2019 IEEE international conference on Blockchain (Blockchain), 237-244, 2019
Combining heterogeneous anomaly detectors for improved software security
W Khreich, SS Murtaza, A Hamou-Lhadj, C Talhi
Journal of Systems and Software 137, 415-429, 2018
Selective mobile cloud offloading to augment multi-persona performance and viability
H Tout, C Talhi, N Kara, A Mourad
IEEE Transactions on Cloud Computing 7 (2), 314-328, 2016
Security evaluation of J2ME CLDC embedded Java platform.
M Debbabi, MM Saleh, C Talhi, S Zhioua
J. Object Technol. 5 (2), 125-154, 2006
Security as a service for public cloud tenants (SaaS)
M Hawedi, C Talhi, H Boucheneb
Procedia computer science 130, 1025-1030, 2018
Performance modeling and analysis of the bitcoin inventory protocol
Y Shahsavari, K Zhang, C Talhi
2019 IEEE International Conference on Decentralized Applications and …, 2019
Weaving security aspects into UML 2.0 design models
D Mouheb, C Talhi, V Lima, M Debbabi, L Wang, M Pourzandi
Proceedings of the 13th workshop on Aspect-oriented modeling, 7-12, 2009
Aspect-oriented modeling for representing and integrating security concerns in UML
D Mouheb, C Talhi, M Nouh, V Lima, M Debbabi, L Wang, M Pourzandi
Software Engineering Research, Management and Applications 2010, 197-213, 2010
Smart mobile computation offloading: Centralized selective and multi-objective approach
H Tout, C Talhi, N Kara, A Mourad
Expert Systems with Applications 80, 1-13, 2017
The system can't perform the operation now. Try again later.
Articles 1–20